Thales e-security Key Isolation for Enterprises and Managed Service Providers
|
|
|
- Ethelbert Norris
- 9 years ago
- Views:
Transcription
1 Thales e-security Key Isolation for Enterprises and Managed Service Providers Technical White Paper May 2015
2 Contents 1. Introduction 1. Introduction Business Models Security World Protecting keys ACLs Policy Enforcement Conclusion... 9 nshield is a family of multi-purpose HSMs that provide a trusted environment for secure cryptographic processing, key protection and key management. Cryptographic keys within an enterprise are used to identify people and machines, secure internal and external communications, encrypt and tokenize data at rest, sign messages and documents as well as other use cases. It is therefore vital for any business with a reliance on cryptographic keys to have assurances and enforceable policies surrounding key usage. The nshield family of Hardware Security Modules (HSMs) provides the ability to achieve that level of assurance. By using the Security World key management framework, supported by the nshield HSM family, an organization can create for itself a structured key infrastructure that meets the dynamic and fluid demands and requirements of today. This paper demonstrates how it is possible to easily configure Security World to define a framework which permits both partitioning and multi-tenancy cryptographic key isolation strategies. page Thales e-security, Inc. All rights reserved. page 3
3 2. Business Models 3. Security World Key isolation is often a requirement in both enterprise and managed service or cloud environments. There are two different business models which have a requirement for some form of partitioning with regards to their cryptographic resources estate: Enterprise customers who have a requirement to share cryptographic infrastructure resources between applications or departments within that same enterprise. Keys should be separated to preserve the necessary isolation between applications. Managed service providers who wish to divide a given cryptographic resource between any number of distinct and independent clients such that keys for one client are not accessible by another client. This paper addresses both models, and shows just how easy it is to design, implement and enforce a policy that meets their requirements. In addition to the requirements of the business model are a number of factors to consider when assessing techniques for partitioning: Object Types: Usually users, applications, or keys. Scale: This can range from one or two enterprise users or applications to millions of keys or customers. Thales Security World addresses the age old challenge of providing strong protection for keys while at the same time ensuring they are available for use by authorized applications that are deployed over high scale, redundant and distributed server To understand the ways in which Thales nshield HSMs can be deployed to support flexible isolation environments, we first need to have a clearer understanding of some Thales Security World architecture principles. To alleviate the developer from the burden of creating a key infrastructure, Thales provides the Security World architecture which is a simple, yet flexible key architecture that can be used to contain application keys, protected in a variety of ways while also providing easy to use load-balancing and disaster recovery functionality. Thales also provides industry standard APIs such as PKCS#11 and JCE based on the Security World architecture. It is assumed when using nshield HSMs that users are utilizing this standard key infrastructure whether integrating with existing standard interfaces or bespoke applications. Security World Key A Security: What determines the true level of security? What authentication policies are protecting application key material? How are physical security controls mapped to logical controls, and vice-versa. HSM A Accessibility: What access does the hosting organization have to customers material? Within an enterprise a provider may want to provide a super-user or an administrative quorum with access to all the keys. However customers will have more trust in a public service if the provider can t access their keys. Key B With all these factors in mind, how can Thales nshield HSMs assist in the development of isolated systems for the control of keys? HSM B Key C Figure 1 - Security World as a single security domain for HSMs and application keys Practically speaking a Security World creates a single security domain for keys and objects to be securely managed that can encompass many HSMs and clients. However, an HSM can only ever be configured with a single Security World at any one time. page Thales e-security, Inc. All rights reserved. page 5
4 3.1. When generating an application key within Security World on a Thales nshield HSM, it is important that the raw key material be protected by the certified hardware of the module at all times. It is also important that the key can be loaded by authorized clients and backed up in accordance with industry best practice guidelines. The Thales Security World provides mechanisms whereby the raw application key material and various meta-data about how the key can be used -- the Access Control List (ACL) -- are cryptographically wrapped using Security World foundation keys, specifically a key called the module key (KM0). The wrapped application key can then be stored on all authorized HSM clients so that they can load the key at a later date, and can also be backed up onto recovery media since the process involves encrypting the raw key data with keys that are only available on an nshield HSM in the correct Security World. Since these wrapped application keys exist on the storage media on the authorized clients, the volume of keys that a Security World can protect is only limited by the size of the storage medium on the host, not some feature or limitation of the HSM. This neatly addresses the topic of scale in relation to isolation principles Protecting the use of keys Where controls need to be implemented for the safeguarding of application keys, Operator Card Sets (OCS) or Softcards (passphrases) can be used to authorize the loading of those keys. Physical OCS and logical softcards are collectively referred to as authentication tokens. An authentication token is associated with an application key when the application key is generated. The application key then requires the authentication token to be presented and validated before the key can be loaded onto an HSM. Once an application key has been loaded into an HSM, it can be used (ACL permitting) as often as required for approved cryptographic operations before then being programmatically or automatically unloaded. A single authentication token can be used to protect multiple application keys Softcards keys are, by default, protected by the KM0 wrapping process, however sometimes it will be necessary to implement additional security controls to ensure an application presents some form of authorization before the HSM legitimately loads the key for use. The single-factor authorization model adopted by Security World is Softcards. page 6 Softcards are really nothing more than a single passphrase, but where physical access to a smart card slot is impractical Softcards can be a practical solution to enforcing some control over when an application key is loaded OCS Quorums nshield HSMs use smart cards to provide two-factor authorization, however an OCS is not a single smart card (although it could be). An OCS is normally a set of smart cards which represent an authorized group. When created, the necessary quorum of these cards is also set. This is the number of cards from the total set that need to be presented in order to authorize the use of the keys protected by the cardset. Since individual cards are normally allocated to authorized members of a group of users (each smart card with a unique passphrase), when a cardset is authorized within the HSM, this does not represent a single user s authorization, but rather the authorization of the group to perform the requested action. The notation used to describe the quorum of the cardset is K of N, where N is the total number of card in the cardset and K (K>0) is the number of cards required to form a quorum (N>0, N<=K). So in a 2 of 5 OCS, there are 5 cards in total but only 2 of this set need to be presented to permit the loading of a key. A special property of a 1 of N OCS is that obviously only a single card need be presented (along with its passphrase). This means that no physical switching of cards in slots needs to take place which can be a practical advantage in certain conditions where you not only want to protect where an application key is loaded, but still also want to retain the Softcard advantage of restricting when it is loaded. Though this is perhaps an inferior configuration to a K of N OCS where K>1 in terms of security over availability ACLs The Access Control List (ACL) forms a significant part of the meta-data associated with a key. It is securely wrapped along with the key when the key is generated, and is protected to the same high standards as the key itself. The ACL for a given key describes what authorizations are required for a specific operation to be performed, such as other keys or tokens that should be loaded, and what other limitations are applied to the key once it is loaded (such as time-outs and number of permitted operations). Security World avoids the need for expensive backup tokens and manual key cloning. An ACL can describe a very simple scenario whereby a key can be used to encrypt and decrypt data, or can describe very complex hierarchies of keys which must be loaded (using their respective authentication tokens) before selected operations can be carried out. These ACL policies are all managed, unwrapped and enforced by the HSM natively, and as such cannot be compromised by an attacker. The ACL for a key is set when the key is generated and is not normally modifiable after that Thales e-security, Inc. All rights reserved. page 7
5 4. Policy Enforcement The concepts of Security World ACLs, OCS Quorums and Softcards are tightly bound together, and can be used in combination or isolation to meet even the most demanding security requirements or policies for a given application. With this in mind, we can now see that a key loading and usage policy is enforced by three factors: Access to the application key token If you don t have the application key token on your application server you simply cannot load that key onto a target HSM. This policy is enforced outside the HSM, by careful and deliberate synchronization of specific application across the application server estate. Token Authorization If a key is protected by an Authorizing token, such as a Softcard or an OCS, then you must present that token before you are then permitted to load the key into the HSM. This policy is enforced inside the HSM. Access Control Lists (ACL) Once the key is loaded, the key can only then be used for specific purposes and under specific conditions described in the ACL that is bundled in the application key token. Again, this policy is enforced inside the HSM. So how can these properties be used to construct an isolated security environment for our example business models of the Enterprise and the Managed Service Provider who require isolation between applications or customers? In both cases you can use individual or combinations of the following strategies:- 1) Restrict the replication of application to only those hosts that require access to use a specific application key. 2) Leverage one of the authorization token techniques (Softcard or OCS) to control when and where an application key is loaded. 3) Programmatically manipulate the ACL of a target application key token to restrict where, when and how the key can be used. By defining a policy as a combination of these strategies, you can then apply different policies to groups of application keys. It is then clear to see how Security World can not only meet a static security environment, but also one where several opposing security policies can co-exist on the same HSM or groups of HSMs. The ACL associated with an Key defines the key policy in a form an nshield HSM can strongly enforce. page Thales e-security, Inc. All rights reserved. page 9
6 5. Conclusion As previously described, there is a high degree of flexibility in the Thales Security World key management architecture which creates a fluid fit with enterprise or managed service requirements for multi-tenancy or partitioning. The nshield HSM hardware provides a safe place where keys can be loaded and used. One of the core strengths of the Security World architecture is that application are stored in an armoured format on application servers free from the confines of any particular HSM. So deciding where the application are and are not available is really the initial factor one should define when designing a framework for partitioning. By abstracting Keys, the size of the pool of available HSMs can be tuned dynamically to satisfy changing performance requirements without the need to clone application keys between HSMs. Module Protected More availability Less enforcement Softcard Protected 1 of N OCS Protected Less availability More enforcement K of N OCS Protected Figure 3 - Degrees of Availability and Enforcement via Authorizing Tokens The design and implementation of your HSM key management policies and architecture are based on your organizational needs and the balance of requirements between the need for accessibility to keys for high volume or automated usage and the security controls defining key usage that might be required by certain high assurance situations. Security World offers several flexible and mutually exclusive mechanisms to assist in this design and implementation of such an architecture. For more details about the Security World architecture, visit Figure 2 stored on hosts It is therefore better to instead conceptualize the partitioning problem less as one about containerizing the HSM, since policy enforcement of key loading and use is already trusted, but more about how the ACLs and authorization tokens are configured with application keys and most importantly how those tokens are distributed and made available to individual application hosts. page Thales e-security, Inc. All rights reserved. page 11
7 About Thales e-security Thales e-security is a leading global provider of trusted cryptographic solutions with a 40-year track record of protecting the world s most sensitive applications and information. Thales solutions enhance privacy, trusted identities, and secure payments with certified, high performance encryption and digital signature technology for customers in a wide range markets including financial services, high technology, manufacturing and government. Thales e-security has a worldwide support capability, with regional headquarters in the United States, United Kingdom, and Hong Kong. Follow us on: Thales e-security May 2015 PLB5024 Americas Thales e-security Inc. 900 South Pine Island Road, Suite 710, Plantation, FL USA Tel: or Fax: [email protected] page Asia Pacific 12 Thales Transport & Security (HK) Lt, Unit , 41/F, Sunlight Tower, 248 Queen s Road East, Wanchai, Hong Kong Tel: Fax: [email protected] Europe, Middle East, Africa Meadow View House, Long Crendon, Aylesbury, Buckinghamshire HP18 9EQ Tel:+44 (0) Fax:+44 (0) [email protected]
nshield Modules Integration Guide for Oracle Database 11g Release 2 Transparent Data Encryption
nshield Modules Integration Guide for Oracle Database 11g Release 2 Transparent Data Encryption Version: 2.0 Date: 01 November 2013 Copyright 2013 Thales e-security Limited. All rights reserved. Copyright
Thales nshield HSM. ADRMS Integration Guide for Windows Server 2008 and Windows Server 2008 R2. www.thales-esecurity.com
Thales nshield HSM ADRMS Integration Guide for Windows Server 2008 and Windows Server 2008 R2 www.thales-esecurity.com Version: 1.0 Date: 11 June 2012 Copyright 2012 Thales e-security Limited. All rights
Thales ncipher modules. Version: 1.2. Date: 22 December 2009. Copyright 2009 ncipher Corporation Ltd. All rights reserved.
ncipher modules Integration Guide for IBM Tivoli Access Manager for e-business 6.1 Windows Server 2003 32-bit and 64-bit Windows Server 2008 32-bit and 64-bit Version: 1.2 Date: 22 December 2009 Copyright
Thales e-security Financial and Operational Benefits of using Datacryptor R4.02 in your network
www.thales-esecurity.com Thales e-security Financial and Operational Benefits of using Datacryptor R4.02 in your network How do you currently manage your key updates for your crypto networks? How much
Integration Guide Microsoft Internet Information Services (IIS) 7.5 Windows Server 2008 R2
Integration Guide Microsoft Internet Information Services (IIS) 7.5 Windows Server 2008 R2 Version: 1.0 Date: 12 October 2010 Copyright 2010 Thales ncipher Corporation Ltd. All rights reserved. These installation
ncipher modules Integration Guide for Microsoft Windows Server 2008 Active Directory Certificate Services Windows Server 2008 32-bit and 64-bit
ncipher modules Integration Guide for Microsoft Windows Server 2008 Active Directory Certificate Services Windows Server 2008 32-bit and 64-bit Version: 1.8 Date: 05 March 2010 Copyright 2010 ncipher Corporation
ncipher Modules Integration Guide for Axway Validation Authority Server 4.11 (Responder) www.thales-esecurity.com
ncipher Modules Integration Guide for Axway Validation Authority Server 4.11 (Responder) www.thales-esecurity.com Version: 1.0 Date: 30 May 2012 Copyright 2012 Thales e-security Limited. All rights reserved.
Thales Database Security Option Pack. for Microsoft SQL Server Integration Guide. www.thales-esecurity.com
Thales Database Security Option Pack for Microsoft SQL Server Integration Guide www.thales-esecurity.com Version: 2.0 Date: 4 May 2012 Copyright 2012 Thales e-security Limited. All rights reserved. Copyright
Efficient Key Management for Oracle Database 11g Release 2 Using Hardware Security Modules
Efficient Key Management for Oracle Database 11g Release 2 Using Hardware Security Modules WHITE PAPER Thales e-security www.thalesesec.com/oracle TABLE OF CONTENT Introduction...3 Oracle Database 11g
Thales e-security keyauthority Security-Hardened Appliance with IBM Tivoli Key Lifecycle Manager Support for IBM Storage Devices
> Thales e-security keyauthority Security-Hardened Appliance with IBM Tivoli Key Lifecycle Manager Support for IBM Storage Devices WHITE PAPER November 2011 www.thales-esecurity.com TABLE OF CONTENTS THE
ncipher Modules Integration Guide for Apache HTTP Server www.thalesgroup.com/iss
ncipher Modules Integration Guide for Apache HTTP Server www.thalesgroup.com/iss Version: 1.3 Date: 19 August 2011 Copyright 2011 Thales e-security Limited. All rights reserved. Copyright in this document
Secure SSL, Fast SSL
Citrix NetScaler and Thales nshield work together to protect encryption keys and accelerate SSL traffic With growing use of cloud-based, virtual, and multi-tenant services, customers want to utilize virtual
ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary
VISIBILITY DATA GOVERNANCE SYSTEM OS PARTITION UNIFIED MANAGEMENT CENTRAL AUDIT POINT ACCESS MONITORING ENCRYPTION STORAGE VOLUME POLICY ENFORCEMENT ProtectV SECURITY SNAPSHOT (backup) DATA PROTECTION
Overview of Luna High Availability and Load Balancing
SafeNet HSM TECHNICAL NOTE Overview of Luna High Availability and Load Balancing Contents Introduction... 2 Overview... 2 High Availability... 3 Load Balancing... 4 Failover... 5 Recovery... 5 Standby
Upgrading and Improving the Trust of Microsoft Windows Certificate Authorities
www.thales-esecurity.com Thales e-security Upgrading and Improving the Trust of Microsoft Windows Certificate Authorities Author: Mark B. Cooper White Paper June 2014 Contents Foreword... 2 Introduction....
John Essner, CISO Office of Information Technology State of New Jersey
John Essner, CISO Office of Information Technology State of New Jersey http://csrc.nist.gov/publications/nistpubs/800-144/sp800-144.pdf Governance Compliance Trust Architecture Identity and Access Management
Thales nshield HSM. Integration Guide for ISC BIND DNSSEC. www.thalesgroup.com/iss
Thales nshield HSM Integration Guide for ISC BIND DNSSEC www.thalesgroup.com/iss Version: 1.1 Date: 15 June 2011 Copyright 2011 Thales e-security Limited. All rights reserved. Copyright in this document
Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH. White Paper February 2010 www.alvandsolutions.
Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH White Paper February 2010 www.alvandsolutions.com Overview Today s increasing security threats and regulatory
COMMVAULT SIMPANA 10 SOFTWARE MULTI-TENANCY FEATURES FOR SERVICE PROVIDERS
COMMVAULT SIMPANA 10 SOFTWARE MULTI-TENANCY FEATURES FOR SERVICE PROVIDERS As cloud adoption continues to rise, so has the demand from Service Providers for software products that support their multi-tenant
Microsoft AD CS and OCSP Integration Guide. Microsoft Windows Server 2008 R2
Microsoft AD CS and OCSP Integration Guide Microsoft Windows Server 2008 R2 Version: 1.2 Date: 15 August 2013 Copyright 2013 Thales e-security Limited. All rights reserved. Copyright in this document is
nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.
CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such
Security Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
Alliance Key Manager Solution Brief
Alliance Key Manager Solution Brief KEY MANAGEMENT Enterprise Encryption Key Management On the road to protecting sensitive data assets, data encryption remains one of the most difficult goals. A major
Implementing a Microsoft SQL Server 2005 Database
This class combines two courses into one 5-day class. 2779 (3-day) & 2780 (2-day) Implementing a Microsoft SQL Server 2005 Database Course 2779: Three days; Instructor-Led Introduction This three-day instructor-led
Web Applications Access Control Single Sign On
Web Applications Access Control Single Sign On Anitha Chepuru, Assocaite Professor IT Dept, G.Narayanamma Institute of Technology and Science (for women), Shaikpet, Hyderabad - 500008, Andhra Pradesh,
Advanced Service Desk Security
Advanced Service Desk Security Robust end-to-end security measures have been built into the GoToAssist Service Desk architecture to ensure the privacy and integrity of all data. gotoassist.com Many service
Data Protection: From PKI to Virtualization & Cloud
Data Protection: From PKI to Virtualization & Cloud Raymond Yeung CISSP, CISA Senior Regional Director, HK/TW, ASEAN & A/NZ SafeNet Inc. Agenda What is PKI? And Value? Traditional PKI Usage Cloud Security
Designing Database Solutions for Microsoft SQL Server 2012 MOC 20465
Designing Database Solutions for Microsoft SQL Server 2012 MOC 20465 Course Outline Module 1: Designing a Database Server Infrastructure This module explains how to design an appropriate database server
Alice. Software as a Service(SaaS) Delivery Platform. innovation is simplicity
Ekartha, Inc. 63 Cutter Mill Road Great Neck, N.Y. 11021 Tel.: (516) 773-3533 Ekartha India Pvt. Ltd. 814/B Law College Road Demech House, 4th Floor Erandwane, Pune, India Email: [email protected] Web:
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates September 2006 Copyright 2006 Entrust. All rights reserved. www.entrust.com Entrust is a registered trademark
Citrix GoToAssist Service Desk Security
Citrix GoToAssist Service Desk Security Robust end-to-end security measures have been built into the GoToAssist Service Desk architecture to ensure the privacy and integrity of all data. 2 Many service
Understanding the Role of Hardware Data Encryption in EMV and P2PE from the CEO s Perspective
Understanding the Role of Hardware Data Encryption in EMV and P2PE from the CEO s Perspective Futurex. An Innovative Leader in Encryption Solutions. For over 30 years, more than 15,000 customers worldwide
Securing Virtual Applications and Servers
White Paper Securing Virtual Applications and Servers Overview Security concerns are the most often cited obstacle to application virtualization and adoption of cloud-computing models. Merely replicating
Data Protection and Mobile Payments. Jose Diaz - Business Development & Technical Alliances Ted Heiman Key Account Manager Thales e-security
Data Protection and Mobile Payments Jose Diaz - Business Development & Technical Alliances Ted Heiman Key Account Manager Thales e-security 2 Today s reality It s a data-centric world. And the data is
RSA Digital Certificate Solution
RSA Digital Certificate Solution Create and strengthen layered security Trust is a vital component of modern computing, whether it is between users, devices or applications in today s organizations, strong
IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation
IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing
Course 20465C: Designing a Data Solution with Microsoft SQL Server
Course 20465C: Designing a Data Solution with Microsoft SQL Server Module 1: Introduction to Enterprise Data Architecture As organizations grow to enterprise scale, their IT infrastructure requirements
Cloud Security. Peter Jopling [email protected] IBM UK Ltd Software Group Hursley Labs. peterjopling. 2011 IBM Corporation
Cloud Security Peter Jopling [email protected] IBM UK Ltd Software Group Hursley Labs peterjopling 2011 IBM Corporation Cloud computing impacts the implementation of security in fundamentally new ways
Mirjam van Olst. Best Practices & Considerations for Designing Your SharePoint Logical Architecture
Mirjam van Olst Best Practices & Considerations for Designing Your SharePoint Logical Architecture About me http://sharepointchick.com @mirjamvanolst [email protected] Agenda Introduction Logical Architecture
IT Security. Securing Your Business Investments
Securing Your Business Investments IT Security NCS GROUP OFFICES Australia Bahrain China Hong Kong SAR India Korea Malaysia Philippines Singapore Sri Lanka Securing Your Business Investments! Information
Complying with PCI Data Security
Complying with PCI Data Security Solution BRIEF Retailers, financial institutions, data processors, and any other vendors that manage credit card holder data today must adhere to strict policies for ensuring
Key Management Best Practices
White Paper Key Management Best Practices Data encryption is a fundamental component of strategies to address security threats and satisfy regulatory mandates. While encryption is not in itself difficult
Information Technology Branch Access Control Technical Standard
Information Technology Branch Access Control Technical Standard Information Management, Administrative Directive A1461 Cyber Security Technical Standard # 5 November 20, 2014 Approved: Date: November 20,
Microsoft Windows Server 2008 PKI and Deploying the ncipher Hardware Security Module
This is a joint ncipher and IdentIT authored whitepaper Microsoft Windows Server 2008 PKI and Deploying the ncipher Hardware Security Module Abstract This paper discusses the benefits that are unique to
Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin
Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin Best Practices for Security in the Cloud John Essner, Director
Mitigating Server Breaches with Secure Computation. Yehuda Lindell Bar-Ilan University and Dyadic Security
Mitigating Server Breaches with Secure Computation Yehuda Lindell Bar-Ilan University and Dyadic Security The Problem Network and server breaches have become ubiquitous Financially-motivated and state-sponsored
Software-Defined Networks Powered by VellOS
WHITE PAPER Software-Defined Networks Powered by VellOS Agile, Flexible Networking for Distributed Applications Vello s SDN enables a low-latency, programmable solution resulting in a faster and more flexible
PrivyLink Cryptographic Key Server *
WHITE PAPER PrivyLink Cryptographic Key * Tamper Resistant Protection of Key Information Assets for Preserving and Delivering End-to-End Trust and Values in e-businesses September 2003 E-commerce technology
Applying Cryptography as a Service to Mobile Applications
Applying Cryptography as a Service to Mobile Applications SESSION ID: CSV-F02 Peter Robinson Senior Engineering Manager RSA, The Security Division of EMC Introduction This presentation proposes a Cryptography
Certificate Management
Certificate Management Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
Active Directory Services with Windows Server
Course 10969B: Active Directory Services with Windows Server Course Details Course Outline Module 1: Overview of Access and Information Protection This module provides an overview of multiple Access and
Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption
THE DATA PROTECTIO TIO N COMPANY Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption whitepaper Executive Summary Long an important security measure, encryption has
e-authentication guidelines for esign- Online Electronic Signature Service
e-authentication guidelines for esign- Online Electronic Signature Service Version 1.0 June 2015 Controller of Certifying Authorities Department of Electronics and Information Technology Ministry of Communications
White Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com
Protecting Mobile Apps with Citrix XenMobile and MDX citrix.com Mobility is a top priority for organizations as more employees demand access to the apps and data that will make them productive. Employees
Active Directory Services with Windows Server
Course 10969B: Active Directory Services with Windows Server Page 1 of 8 Active Directory Services with Windows Server Course 10969B: 4 days; Instructor-Led Introduction Get Hands on instruction and practice
SafeNet DataSecure vs. Native Oracle Encryption
SafeNet vs. Native Encryption Executive Summary Given the vital records databases hold, these systems often represent one of the most critical areas of exposure for an enterprise. Consequently, as enterprises
ADVANCING SECURITY IN STORAGE AREA NETWORKS
WHITE PAPER ADVANCING SECURITY IN STORAGE AREA NETWORKS Brocade Secure Fabric OS provides a reliable framework for enhancing security in mission-critical SAN environments As organizations continue to broaden
VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui
VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui School of Engineering and Computer Science Te Kura Mātai Pūkaha, Pūrorohiko PO Box 600 Wellington New Zealand Tel: +64 4 463
East African Information Conference 13-14 th August, 2013, Kampala, Uganda. Security and Privacy: Can we trust the cloud?
East African Information Conference 13-14 th August, 2013, Kampala, Uganda Security and Privacy: Can we trust the cloud? By Dr. David Turahi Director, Information Technology and Information Management
Advanced virtualization management for Hyper-V and System Center environments. www.citrix.com
Advanced virtualization management for Hyper-V and System Center environments www.citrix.com Introduction Microsoft Hyper-V provides a dynamic, reliable and scalable virtualization platform enabling cost
Secure cloud access system using JAR ABSTRACT:
Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that
Building a better branch office. www.citrix.com
Building a better branch office www.citrix.com Introduction The majority of workers today are in branch offices, not in a headquarters facility. In many instances, all of the applications used by branch
CRYPTOGRAPHY AS A SERVICE
CRYPTOGRAPHY AS A SERVICE Peter Robinson RSA, The Security Division of EMC Session ID: ADS R01 Session Classification: Advanced Introduction Deploying cryptographic keys to end points such as smart phones,
Designing a Data Solution with Microsoft SQL Server 2014
Page 1 of 8 Overview The focus of this five-day instructor-led course is on planning and implementing enterprise database infrastructure solutions by using SQL Server 2014 and other Microsoft technologies.
efolder White Paper: HIPAA Compliance
efolder White Paper: HIPAA Compliance October 2014 Copyright 2014, efolder, Inc. Abstract This paper outlines how companies can use certain efolder services to facilitate HIPAA and HITECH compliance within
Security Overview Enterprise-Class Secure Mobile File Sharing
Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud
Designing a Data Solution with Microsoft SQL Server
The focus of this five-day instructor-led course is on planning and implementing enterprise database infrastructure solutions by using SQL Server 2014 and other Microsoft technologies. It describes how
Object Storage: A Growing Opportunity for Service Providers. White Paper. Prepared for: 2012 Neovise, LLC. All Rights Reserved.
Object Storage: A Growing Opportunity for Service Providers Prepared for: White Paper 2012 Neovise, LLC. All Rights Reserved. Introduction For service providers, the rise of cloud computing is both a threat
An Oracle White Paper June 2014. Security and the Oracle Database Cloud Service
An Oracle White Paper June 2014 Security and the Oracle Database Cloud Service 1 Table of Contents Overview... 3 Security architecture... 4 User areas... 4 Accounts... 4 Identity Domains... 4 Database
Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11)
Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11) Executive Summary...3 Background...4 Internet Growth in the Pharmaceutical Industries...4 The Need for Security...4
Server Virtualization with Windows Server Hyper-V and System Center
Course 20409 : Server Virtualization with Windows Server Hyper-V and System Center Page 1 of 8 Server Virtualization with Windows Server Hyper-V and System Center Course 20409: 4 days; Instructor-Led Introduction
TPM Key Backup and Recovery. For Trusted Platforms
TPM Key Backup and Recovery For Trusted Platforms White paper for understanding and support proper use of backup and recovery procedures for Trusted Computing Platforms. 2006-09-21 V0.95 Page 1 / 17 Contents
[email protected] [email protected]
1 The following is merely a collection of notes taken during works, study and just-for-fun activities No copyright infringements intended: all sources are duly listed at the end of the document This work
Course 20465: Designing a Data Solution with Microsoft SQL Server
Course 20465: Designing a Data Solution with Microsoft SQL Server Overview About this course The focus of this five-day instructor-led course is on planning and implementing enterprise database infrastructure
Designing a Data Solution with Microsoft SQL Server
Course 20465C: Designing a Data Solution with Microsoft SQL Server Page 1 of 6 Designing a Data Solution with Microsoft SQL Server Course 20465C: 4 days; Instructor-Led Introduction The focus of this four-day
TOP SECRETS OF CLOUD SECURITY
TOP SECRETS OF CLOUD SECURITY Protect Your Organization s Valuable Content Table of Contents Does the Cloud Pose Special Security Challenges?...2 Client Authentication...3 User Security Management...3
CompTIA Cloud+ Course Content. Length: 5 Days. Who Should Attend:
CompTIA Cloud+ Length: 5 Days Who Should Attend: Project manager, cloud computing services Cloud engineer Manager, data center SAN Business analyst, cloud computing Summary: The CompTIA Cloud+ certification
The Benefits of Virtualizing
T E C H N I C A L B R I E F The Benefits of Virtualizing Aciduisismodo Microsoft SQL Dolore Server Eolore in Dionseq Hitachi Storage Uatummy Environments Odolorem Vel Leveraging Microsoft Hyper-V By Heidi
Security from a customer s perspective. Halogen s approach to security
September 18, 2015 Security from a customer s perspective Using a cloud-based talent management program can deliver tremendous benefits to your organization, including aligning your workforce, improving
SQL Azure vs. SQL Server
SQL Azure vs. SQL Server Authors Dinakar Nethi, Niraj Nagrani Technical Reviewers Michael Thomassy, David Robinson Published April 2010 Summary SQL Azure Database is a cloud-based relational database service
SP 800-130 A Framework for Designing Cryptographic Key Management Systems. 5/25/2012 Lunch and Learn Scott Shorter
SP 800-130 A Framework for Designing Cryptographic Key Management Systems 5/25/2012 Lunch and Learn Scott Shorter Topics Follows the Sections of SP 800-130 draft 2: Introduction Framework Basics Goals
The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency
logo The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency Understanding the Multiple Levels of Security Built Into the Panoptix Solution Published: October 2011
High Security Online Backup. A Cyphertite White Paper February, 2013. Cloud-Based Backup Storage Threat Models
A Cyphertite White Paper February, 2013 Cloud-Based Backup Storage Threat Models PG. 1 Definition of Terms Secrets Passphrase: The secrets passphrase is the passphrase used to decrypt the 2 encrypted 256-bit
Configuring and Administering Microsoft SharePoint 2010
Course 10174 : Configuring and Administering Microsoft SharePoint 2010 Page 1 of 7 Configuring and Administering Microsoft SharePoint 2010 Course 10174: 4 days; Instructor-Led Introduction This four-day
Active Directory Services with Windows Server MOC 10969
Active Directory Services with Windows Server MOC 10969 Course Outline Module 1: Overview of Access and Information Protection This module explains Access and Information Protection (AIP) solutions from
SSL ACCELERATION DEPLOYMENT STRATEGIES FOR ENTERPRISE SECURITY
SSL ACCELERATION DEPLOYMENT STRATEGIES FOR ENTERPRISE SECURITY Introduction OPTIMIZING SSL DEPLOYMENT On-demand business breaks down the traditional network perimeter, creating interconnected systems between
Brainloop Cloud Security
Whitepaper Brainloop Cloud Security Guide to secure collaboration in the cloud www.brainloop.com Sharing information over the internet The internet is the ideal platform for sharing data globally and communicating
Integration Guide. Microsoft Internet Information Services (IIS) 7.0 and ncipher Modules. Windows Server 2008 (32-bit and 64-bit)
Integration Guide Microsoft Internet Information Services (IIS) 7.0 and ncipher Modules Windows Server 2008 (32-bit and 64-bit) These installation instructions are intended to provide step-by-step instructions
